Publications
Conference
2025
-
[CCS’25]. BOLT: Bandwidth-Optimized Lightning-Fast Oblivious Map powered by Secure HBM Accelerators
Yitong Guo, Hongbo Chen, Haobin Chen, Yukui Luo, XiaoFeng Wang, Chenghong Wang -
[SC’25]. DPAR: High-Performance, Secure, and Scalable Differential Privacy-based AllReduce
Hao Qi, Weicong Chen, Chenghong Wang, Xiaoyi Lu -
[Security’25]. PICACHV: Formally Verified Enforcement for Data in Use Policies for Data Analytics
Haobin Chen, Hongbo Chen, Mingshen Sun, Chenghong Wang, XiaoFeng Wang
2024
-
[VLDB’24]. SPECIAL: Synopsis Assisted Secure Collaborative Analytics
Chenghong Wang, Lina Qiu, Johes Bater, Yukui Luo
2023
-
[NeurIPS’23]. LinGCN: Structural Linearized Graph Convolutional Network for Homomorphically Encrypted Inference
Hongwu Peng, Ran Ran, Yukui Luo, Jiahui Zhao, S. Huang, K. Thorat, T. Geng, Chenghong Wang, Xiaolin Xu, Wujie Wen, Caiwen Ding -
[Security’23]. Private Proof-of-Stake Blockchains using Differentially-Private Stake Distortion
Chenghong Wang, David Pujol, Kartik Nayak, Ashwin Machanavajjhala -
[MICRO’23]. AQ2PNN: Enabling Two-party Privacy-Preserving Deep Neural Network Inference with Adaptive Quantization
Yukui Luo, Nuo Xu, Hongwu Peng, Chenghong Wang, Shijin Duan, Kaleel Mahmood, Wujie Wen, Caiwen Ding, Xiaolin Xu -
[ICCV’23]. AutoReP: Automatic ReLU Replacement for Fast Private Network Inference
Hongwu Peng, Shaoyi Huang, Tong Zhou, Yukui Luo, Chenghong Wang, Zigeng Wang, Jiahui Zhao, Xi Xie, Ang Li, Tong Geng, Kaleel Mahmood , Wujie Wen, Xiaolin Xu, Caiwen Ding -
[DAC’23]. PASNet: Polynomial Architecture Search Framework for Two-party Computation-based Secure Neural Network Deployment
Hongwu Peng, Shanglin Zhou, Yukui Luo, Nuo Xu, Shijin Duan, Ran Ran, Jiahui Zhao, Chenghong Wang, Tong Geng, Wujie Wen, Xiaolin Xu, Caiwen Ding
2022
-
[SIGMOD’22]. IncShrink: Architecting Efficient Outsourced Databases using Incremental MPC and Differential Privacy
Chenghong Wang, Johes Bater, Kartik Nayak, Ashwin Machanavajjhala
2021
-
[SIGMOD’21]. DP-Sync: Hiding Update Patterns in Secure Outsourced Databases with Differential Privacy
Chenghong Wang, Johes Bater, Kartik Nayak, Ashwin Machanavajjhala -
[EMNLP’21]. Tag: Gradient Attack on Transformer-based Language Models
Jieren Deng, Yijue Wang, Ji Li, Chenghong Wang, Chao Shang, Hang Liu, Sanguthevar Rajasekaran, Caiwen Ding -
[EMNLP’21]. A Secure and Efficient Federated Learning Framework for NLP
Chenghong Wang+, Jieren Deng+, Xianrui Meng, Yijue Wang, Ji Li, Sheng Lin, Shuo Han, Fei Miao, S. Rajasekaran, C. Ding -
[IJCAI’21]. Against Membership Inference Attack: Pruning is All You Need
Yijue Wang, Chenghong Wang, Zigeng Wang, Shanglin Zhou, Hang Liu, Jinbo Bi, Caiwen Ding, Sanguthevar Rajasekaran
2020
-
[SIGMOD’20]. Crypt$\epsilon$:Crypto-Assisted Differential Privacy on Untrusted Servers
Amrita Chowdhury, Chenghong Wang, Xi He, Ashwin Machanavajjhala, Somesh Jha
Before 2018
-
[AMIA’18]. Privacy-preserving Biomedical Data Dissemination via a Hybrid Approach
Chenghong Wang+, Yichen Jiang+, Zhixuan Wu, Xin Du, Shuang Wang -
[WWW’17]. The k-peak decomposition: Mapping the Global Structure of Graphs
Priya Govindan, Chenghong Wang, Chumeng Xu, Hongyu Duan, Sucheta Soundarajan
Journal
-
J3. Memristor-Based Spectral Decomposition of Matrices and Its Applications.
Zeinab S. Jalali, Chenghong Wang, Griffin Kearney, Geng Yuan, Caiwen Ding, Yinan Zhou, Yanzhi Wang, Sucheta Soundarajan
IEEE Transactions on Computers, 2022 -
J2. SecureLR: Secure Logistic Regression Model via a Hybrid Cryptographic Protocol
Yichen Jiang+, Jenny Hamer+, Chenghong Wang+, Xiaoqian Jiang , Miran Kim, Yongsoo Song, Yuhou Xia, Noman Mohammed, Md Nazmus Sadat, Shuang Wang
IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2018 -
J1. PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension
F. Chen, C. Wang, W. Dai, X. Jiang, N. Mohammed, M. Aziz, M. Sadat, C. Sahinalp, K. Lauter, S. Wang
BMC Medical Genomics, 2017
For the complete list, please refer to my Google Scholar